Re: Interpreting call trace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> For better understanding you can do
>> gdb vmlinux
> and then run
> gdb> disassemble _read_unlock_bh
>
> Then look at offset 0x10.

Did that. Is there any way to show disassembled
output interleaved with source code?


thank you all for your answers.

Daniel.

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux